2019
DOI: 10.1016/j.ipm.2018.02.003
|View full text |Cite
|
Sign up to set email alerts
|

Prediction of drive-by download attacks on Twitter

Abstract: The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack using a malicious Web server. This is known as a drive-bydownload. In a drive-by-download a user's computer system is infe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…Thus, giving us 6,122 malicious sample across seven sporting events and a malicious log containing millions of rows of machine activity. The collected malware sample when compared to previous studies, like by Moser et al [40] (308 malware sample), Ahmadi et al [1] (806 malware sample) and Naval et al [41] (2,435 malware sample), was a bigger and diverse sample that was collected over a period of three years and was used to built a drive-by download prediction model [28].…”
Section: Data Collectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, giving us 6,122 malicious sample across seven sporting events and a malicious log containing millions of rows of machine activity. The collected malware sample when compared to previous studies, like by Moser et al [40] (308 malware sample), Ahmadi et al [1] (806 malware sample) and Naval et al [41] (2,435 malware sample), was a bigger and diverse sample that was collected over a period of three years and was used to built a drive-by download prediction model [28].…”
Section: Data Collectionmentioning
confidence: 99%
“…Number of user mentions were used because an adversary could make their post visible to an influential user that has high number of follower by mentioning them in their post. Similarly, age of account was chosen because it has been used as a parameter to identify tweets containing malicious URLs [28]. Both emotion and sentiment were chosen because they have in the past been used to understand propagation of post [5].…”
Section: Dependent Measurementioning
confidence: 99%
See 1 more Smart Citation
“…Drive-by or download (FIGURE 4-3.6) is another software threat that requires no action from the user, however, the malicious code is automatically downloaded. It contributed to 48% of all web-based attacks in 2017 [87], [88] and is considered one of the main threats in 2019 [89]. Fingerprinting (FIGURE 4 -3.3) and misconfiguration are also forms of software threats.…”
Section: ) Host Threatsmentioning
confidence: 99%
“…This special issue covers a wide range of applications that rely on real-time processing of social media, including event detection [8,14,7], cybersecurity [10], opinion mining [5] and automatic geo-localization [7]. The diversity of submissions received shows the need for furthering research in processing social media streams in a (near) real-time.…”
Section: Conclusion and Future Research Directionsmentioning
confidence: 99%